Project

General

Profile

Actions

Regression #12615

closed

MAC passthrough does not work on the latest snapshot

Added by Viktor Gurov over 2 years ago. Updated about 2 years ago.

Status:
Resolved
Priority:
High
Assignee:
Viktor Gurov
Category:
Captive Portal
Target version:
Start date:
Due date:
% Done:

100%

Estimated time:
Plus Target Version:
22.01
Release Notes:
Force Exclusion
Affected Version:
2.6.0
Affected Architecture:

Description

CP login page always appears

config.xml is ok:

                        <passthrumac>
                                <action>pass</action>
                                <mac>e2:51:f2:61:23:4b</mac>
                                <descr><![CDATA[windowspc]]></descr>
                        </passthrumac>

ipfw tables too:

# ipfw table all list
--- table(cp_ifaces), set(0) ---
vtnet0 2100 19578 6256264 1639752869
--- table(cpzone1_auth_up), set(0) ---
--- table(cpzone1_host_ips), set(0) ---
192.168.88.100/32 0 9278 4839663 1639752869
--- table(cpzone1_pipe_mac), set(0) ---
 e2:51:f2:61:23:4b any 2001 3008 761439 1639752868
 any e2:51:f2:61:23:4b 2000 3987 337435 1639752868
--- table(cpzone1_auth_down), set(0) ---
--- table(cpzone1_allowed_up), set(0) ---
--- table(cpzone1_allowed_down), set(0) ---

tcpdump:

tcpdump -qn -i vtnet0 ether host e2:51:f2:61:23:4b
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vtnet0, link-type EN10MB (Ethernet), capture size 262144 bytes
17:56:02.869612 IP 192.168.88.150.2375 > 89.108.119.43.443: tcp 0
17:56:03.271994 IP 192.168.88.150.2376 > 89.108.119.43.443: tcp 0
17:56:03.825248 IP 192.168.88.150.2389 > 34.107.221.82.80: tcp 0

pfSense 2.6.0.b.20211216.0600

Actions

Also available in: Atom PDF